![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer communications & networking
This book covers computationally innovative methods and technologies including data collection and elicitation, data processing, data analysis, data visualizations, and data presentation. It explores how digital humanists have harnessed the hypersociality and social technologies, benefited from the open-source sharing not only of data but of code, and made technological capabilities a critical part of humanities work. Chapters are written by researchers from around the world, bringing perspectives from diverse fields and subject areas. The respective authors describe their work, their research, and their learning. Topics include semantic web for cultural heritage valorization, machine learning for parody detection by classification, psychological text analysis, crowdsourcing imagery coding in natural disasters, and creating inheritable digital codebooks.Designed for researchers and academics, this book is suitable for those interested in methodologies and analytics that can be applied in literature, history, philosophy, linguistics, and related disciplines. Professionals such as librarians, archivists, and historians will also find the content informative and instructive.
Enterprise Information Systems (EIS) allow for the sharing and coordination of information across an organization. Given the global nature of today's business, it has become necessary to develop strategic alliances and promote inter-organizational communication. This collection, entitled Organizational Advancements through Enterprise Information Systems: Emerging Applications and Developments, provides a comprehensive assessment of the latest developments in the EIS revolution. Individual chapters, which focus on Enterprise Resource Planning (ERP) adoption, the integration of enterprise systems, personalized ERP, and the Semantic Web, offer ideas and solutions for the future of the global enterprise.
The Russian regime's struggle for internal control drives multifaceted actions in cyberspace that do not stop at national borders. Cybercrime, technical hacking, and disinformation are complementary tools to preserve national power internally while projecting effects onto myriad neighbors and rivals. Russian activity in the cyber domain is infamous in the United States and other Western countries. Weaponizing Cyberspace explores the Russian proclivity, particularly in the 21st century, for using cyberspace as an environment in which to launch technical attacks and disinformation campaigns that sow chaos and distraction in ways that provide short-term advantage to autocrats in the Kremlin. Arguing that Russia's goal is to divide people, Sambaluk explains that Russia's modus operandi in disinformation campaigning is specifically to find and exploit existing sore spots in other countries. In the U.S., this often means inflaming political tensions among people on the far left and far right. Russia's actions have taken different forms, including the sophisticated surveillance and sabotage of critical infrastructure, the ransoming of data by criminal groups, and a welter of often mutually contradictory disinformation messages that pollute online discourse within and beyond Russia. Whether deployed to contribute to hybrid war or to psychological fracture and disillusionment in targeted societies, the threat is real and must be understood and effectively addressed. Explains how the legacy of Soviet information operations and the modern examples of Russian information operations are similar but not identical to one another Explores the development of Russian domestic information operations techniques that can now be applied against foreign powers Describes the relationships between technical attacks and disinformation often used in confrontations with countries along Russia's borders Examines the role of Russian information operations in U.S. social and political discourse Considers the implications of other countries' reactions that attempt to eliminate the Russian information operation's ability to influence society
This book presents state-of-the-art research, challenges and solutions in the area of cloud-based cyber-physical systems (CPS) used in manufacturing. It provides a comprehensive review of the literature and an in-depth treatment of novel methodologies, algorithms and systems in the area of architecture design, cyber security, process planning, monitoring and control. The book features detailed descriptions of how to derive solutions in a cloud environment where physical machines can be supported by cyber decision systems when engaged in real operations. It presents a range of novel ideas and is characterized by a balanced approach in terms of scope vs. depth and theory vs. applications. It also takes into account the need to present intellectual challenges while appealing to a broad readership, including academic researchers, practicing engineers and managers, and graduate students. Dedicated to the topic of cloud-based CPS and its practical applications in manufacturing, this book benefits readers from all manufacturing sectors, from system design to lifecycle engineering and from process planning to machine control. It also helps readers to understand the present challenges and future research directions towards factories of the future, helping them to position themselves strategically for career development.
This book proposes essential methods, models, and case studies for Sustainable Logistics and Production in Industry 4.0. In addition to identifying and discussing various challenges and future prospects, it also features numerous case studies and quantitative research from different sectors. The authors (which include academics and managers) present insightful tips on the technical, organizational and social aspects of implementing Sustainable Logistics and Production in Industry 4.0. In today's world, changes are coming faster and more unpredictably. Production is becoming more automated, computerized and complex. In short, Industry 4.0 is creating many new opportunities, but at the same time several new challenges. This book offers a valuable resource for all academics and practitioners who want to deepen their knowledge of Sustainable Logistics and Production in Industry 4.0.
This book describes the most frequently used high-speed serial buses in embedded systems, especially those used by FPGAs. These buses employ SerDes, JESD204, SRIO, PCIE, Aurora and SATA protocols for chip-to-chip and board-to-board communication, and CPCIE, VPX, FC and Infiniband protocols for inter-chassis communication. For each type, the book provides the bus history and version info, while also assessing its advantages and limitations. Furthermore, it offers a detailed guide to implementing these buses in FPGA design, from the physical layer and link synchronization to the frame format and application command. Given its scope, the book offers a valuable resource for researchers, R&D engineers and graduate students in computer science or electronics who wish to learn the protocol principles, structures and applications of high-speed serial buses.
This book presents an overview of the latest smart transportation systems, IoV connectivity frameworks, issues of security and safety in VANETs, future developments in the IoV, technical solutions to address key challenges, and other related topics. A connected vehicle is a vehicle equipped with Internet access and wireless LAN, which allows the sharing of data through various devices, inside as well as outside the vehicle. The ad-hoc network of such vehicles, often referred to as VANET or the Internet of vehicles (IoV), is an application of IoT technology, and may be regarded as an integration of three types of networks: inter-vehicle, intra-vehicle, and vehicular mobile networks. VANET involves several varieties of vehicle connectivity mechanisms, including vehicle-to-infrastructure (V2I), vehicle-to-vehicle (V2V), vehicle-to-cloud (V2C), and vehicle-to-everything (V2X). According to one survey, it is expected that there will be approximately 380 million connected cars on the roads by 2020. IoV is an important aspect of the new vision for smart transportation. The book is divided into three parts: examining the evolution of IoV (basic concepts, principles, technologies, and architectures), connectivity of vehicles in the IoT (protocols, frameworks, and methodologies), connected vehicle environments and advanced topics in VANETs (security and safety issues, autonomous operations, machine learning, sensor technology, and AI). By providing scientific contributions and workable suggestions from researchers and practitioners in the areas of IoT, IoV, and security, this valuable reference aims to extend the body of existing knowledge.
With the massive increase of data and traffic on the Internet within the 5G, IoT and smart cities frameworks, current network classification and analysis techniques are falling short. Novel approaches using machine learning algorithms are needed to cope with and manage real-world network traffic, including supervised, semi-supervised, and unsupervised classification techniques. Accurate and effective classification of network traffic will lead to better quality of service and more secure and manageable networks. This authored book investigates network traffic classification solutions by proposing transport-layer methods to achieve better run and operated enterprise-scale networks. The authors explore novel methods for enhancing network statistics at the transport layer, helping to identify optimal feature selection through a global optimization approach and providing automatic labelling for raw traffic through a SemTra framework to maintain provable privacy on information disclosure properties.
The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial, infrastructural, or environmental processes. The need to secure and identify threats to the system is equally critical. Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection provides a full and detailed understanding of the vulnerabilities and security threats that exist within an industrial control system. This collection of research defines and analyses the technical, procedural, and managerial responses to securing these systems.
To survive in today's competitive business environment, marketing professionals must look to develop innovative methods of reaching their customers and stakeholders. Social media is a useful tool for developing the relationships between businesses and consumers. Building Brand Identity in the Age of Social Media: Emerging Research and Opportunities is a critical scholarly resource that examines the media consumption and habits of consumers to evaluate the challenges of brand building. Featuring coverage on a broad range of topics such as brand identity, brand loyalty, and social media branding, this book is geared towards marketing professionals, business managers, and individuals interested in how social media fits into today's marketing environments.
This book traces the pedagogical evolution of technical communication in America as it grew out of Engineering English requirements from roughly the turn of the century to 1950. This study examines specific curricular patterns, texts, and writers on the subject of technical communication, while also tracing engineering educational patterns as they emerge from the proceedings of the society for the promotion of engineering education. Unique to the second edition of the book is a new preface by the recent past ATTW series editor, Jimmie Killingsworth, a new introduction by Elizabeth Tebeaux, and an epilogue by Katherine Staples. Writing in a Milieu of Utility concludes that technical writing, as we teach it today, likely found its roots in engineering composition pedagogy, when, at approximately the turn of the century, engineering educators recognized that writing about science and technology not only made sense in an academic milieu that emphasized utility, but that such writing could also contribute to the professional success of engineering students. Existing somewhat tenuously as engineering itself sought academic status, technical communication emerged ultimately as a re-conceptualized composition course, after early to mid twentieth century calls for English and engineering cooperation made traditional composition offerings less relevant. Academic writing on environmental communication proliferated in the 1990's. A few of us had been calling for such work and making initial investigations throughout the 1980's, but the momentum in the field built slowly. Spurred by coverage in the mass media, academic publishers finally caught the wave of interest. In this exciting new volume, the editors demonstrate more fully than ever before how environmental rhetoric and technical communication go hand in hand. The key link that they and their distinguished group of contributors have discovered is the ancient concern of communication scholars with public deliberation. Environmental issues present technical communicators with some of their greatest challenges, above all, how to make the highly specialized and inscrutably difficult technical information generated by environmental scientists and engineers usable in public decision making. The editors encourage us to accept the challenge of contributing to environmentally conscious decision making by integrating technical knowledge and human values. For technical communicators who accept the challenge of working toward solutions by opening access to crucial information and by engaging in critical thinking on ecological issues, the research and theory offered in this volume provide a strong foundation for future practice.
This book uses motivating examples and real-life attack scenarios to introduce readers to the general concept of fault attacks in cryptography. It offers insights into how the fault tolerance theories developed in the book can actually be implemented, with a particular focus on a wide spectrum of fault models and practical fault injection techniques, ranging from simple, low-cost techniques to high-end equipment-based methods. It then individually examines fault attack vulnerabilities in symmetric, asymmetric and authenticated encryption systems. This is followed by extensive coverage of countermeasure techniques and fault tolerant architectures that attempt to thwart such vulnerabilities. Lastly, it presents a case study of a comprehensive FPGA-based fault tolerant architecture for AES-128, which brings together of a number of the fault tolerance techniques presented. It concludes with a discussion on how fault tolerance can be combined with side channel security to achieve protection against implementation-based attacks. The text is supported by illustrative diagrams, algorithms, tables and diagrams presenting real-world experimental results.
Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communication guides readers through the fascinating history and principles of deception-and how these techniques and stratagems are now being effectively used by cyber attackers. Users will find an in-depth guide that provides valuable insights into the cognitive, sensory and narrative bases of misdirection, used to shape the targeted audience's perceptions and beliefs. The text provides a detailed analysis of the psychological, sensory, sociological, and technical precepts that reveal predictors of attacks-and conversely postmortem insight about attackers-presenting a unique resource that empowers readers to observe, understand and protect against cyber deception tactics. Written by information security experts with real-world investigative experience, the text is the most instructional book available on the subject, providing practical guidance to readers with rich literature references, diagrams and examples that enhance the learning process.
Because the wireless industry is less capital intensive than others sectors in the telecommunications marketplace, it is expected to enjoy continued profitability. With survival at stake, telecommunications companies must ready themselves for battle to win access and operations rights in the wireless communications spectrum. This book maps out the strategies required to fight this battle by explaining how a telecommunications company should structure its entry and operations in the spectrum.
Advances in computing technology and internet-worked environments have driven profound realignments not only in the dynamics of technologically mediated interpersonal interactions but also in the way organizations engage with consumers, producers, and other businesses. Connectivity and Knowledge Management in Virtual Organizations: Networking and Developing Interactive Communications provides managers and academicians with a comprehensive review of innovations and trends in virtual organizations. Covering topics such as knowledge creation and management, virtual customer networks, e-commerce, and virtual communities this reference book offers incisive analysis of the full spectrum of technologies, applications, practices, and outcomes within this growing field.
* The ELS model of enterprise security is endorsed by the Secretary of the Air Force for Air Force computing systems and is a candidate for DoD systems under the Joint Information Environment Program. * The book is intended for enterprise IT architecture developers, application developers, and IT security professionals. * This is a unique approach to end-to-end security and fills a niche in the market.
Information security practices are the backbone of smart factories, which dynamically coordinate and optimize production processes based on data produced and collected by the underlying cyber-physical systems, in terms of resource usage. Recent advances in the best practices, opportunities, challenges, and benefits of information security must be studied and considered for businesses across sectors to successfully utilize the practices in their internet of things, 5G, and next-generation wireless networks. Information Security Practices for the Internet of Things, 5G, and Next-Generation Wireless Networks highlights research on secure communication of 5G, internet of things, and next-generation wireless networks along with related areas to ensure secure and internet-compatible internet of things systems. The book also discusses the effects of the internet of things technologies on various situations in smart city design. Covering a range of topics such as secure communications and security evaluations, this reference work is ideal for industry professionals, business owners, engineers, researchers, scholars, practitioners, academicians, instructors, and students.
Blockchain is a technology that transcends cryptocurrencies. There are other services in different sectors of the economy that can benefit from the trust and security that blockchains offer. For example, financial institutions are using blockchains for international money transfer, and in logistics, it has been used for supply chain management and tracking of goods. As more global companies and governments are experimenting and deploying blockchain solutions, it is necessary to compile knowledge on the best practices, strategies, and failures in order to create a better awareness of how blockchain could either support or add value to other services. Cross-Industry Use of Blockchain Technology and Opportunities for the Future provides emerging research highlighting the possibilities inherent in blockchain for different sectors of the economy and the added value blockchain can provide for the future of these different sectors. Featuring coverage on a broad range of topics such as data privacy, information sharing, and digital identity, this book is ideally designed for IT specialists, consultants, design engineers, cryptographers, service designers, researchers, academics, government officials, and industry professionals.
Mobile Cloud Computing: Foundations and Service Models combines cloud computing, mobile computing and wireless networking to bring new computational resources for mobile users, network operators and cloud computing providers. The book provides the latest research and development insights on mobile cloud computing, beginning with an exploration of the foundations of cloud computing, existing cloud infrastructures classifications, virtualization techniques and service models. It then examines the approaches to building cloud services using a bottom-up approach, describing data center design, cloud networking and software orchestration solutions, showing how these solutions support mobile devices and services. The book describes mobile cloud clouding concepts with a particular focus on a user-centric approach, presenting a distributed mobile cloud service model called POEM to manage mobile cloud resource and compose mobile cloud applications. It concludes with a close examination of the security and privacy issues of mobile clouds.
Are you new to PeopleSoft? Experienced, but somewhat baffled by PeopleSoft Security? Just wondering what the heck a Primary Permission List does anyway? Well, The Expert Guide to PeopleSoft Security is for you. The Expert Guide to PeopleSoft Security provides all the information you need to successfully implement and administer security in PeopleSoft 8. Covering specifics for PeopleTools versions 8.1, 8.2 and 8.4, it is the first book to provide an in-depth look at one of the most important aspects of the PeopleSoft System. The Expert Guide to PeopleSoft Security provides knowledge and insight for Administrators, Managers, Developers and Users alike. success, including: Security Design, User Profile Setup, Role & Permission List Setup, Process Security, Query Security, Row Level Security (for HR and Financials), Portal Security, Security Migrations, Definition Security, LDAP Authentication, Password Controls, Dynamic Role Creation and more. Additionally it provides an indispensable reference to PeopleSoft Security Tables as well as SQL scripts to query the security information most requested from the system. All in all The Expert Guide to PeopleSoft Security provides a comprehensive look at one of the most misunderstood but essential parts of the PeopleSoft System. Is your system properly secured?
Surveillance Technologies and Early Warning Systems: Data Mining Applications for Risk Detection has never been more important, as the research this book presents an alternative to conventional surveillance and risk assessment. This book is a multidisciplinary excursion comprised of data mining, early warning systems, information technologies and risk management and explores the intersection of these components in problematic domains. It offers the ability to apply the most modern techniques to age old problems allowing for increased effectiveness in the response to future, eminent, and present risk.
In the digital era, information is the most valuable resource, and protecting one s assets is a constant struggle for both individuals and organizations. Analyzing Security, Trust, and Crime in the Digital World explores techniques and technologies used to secure data and prevent intrusion in virtual environments. Within these pages, computer scientists, programmers, engineers, and practitioners will find meaningful research on intrusion detection and authentication techniques in order to further defend their own systems and protect the information therein." |
![]() ![]() You may like...
Network+ Guide to Networks
Jill West, Jean Andrews, …
Paperback
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, …
Paperback
R1,539
Discovery Miles 15 390
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, …
Hardcover
R8,410
Discovery Miles 84 100
|